<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=2443&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / Heads up: X Server exploit CVE-2018-14665]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=2443</link>
		<description><![CDATA[The most recent posts in Heads up: X Server exploit CVE-2018-14665.]]></description>
		<lastBuildDate>Fri, 26 Oct 2018 16:09:46 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: Heads up: X Server exploit CVE-2018-14665]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12462#p12462</link>
			<description><![CDATA[<p>Hello:</p><div class="quotebox"><cite>Ogis1975 wrote:</cite><blockquote><div><p>Security updates for this&#160; vulnerability already in the mirrors.</p></div></blockquote></div><p>Indeed ...<br />Saw it not 15&#039; after I posted.<br />Fast as lightning.&#160; =-)</p><p>A big <span class="bbc">Thank You!</span> to the maintainers.</p><p>Cheers,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Fri, 26 Oct 2018 16:09:46 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12462#p12462</guid>
		</item>
		<item>
			<title><![CDATA[Re: Heads up: X Server exploit CVE-2018-14665]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12458#p12458</link>
			<description><![CDATA[<div class="quotebox"><blockquote><div><p>In any case, I guess a patch/update should be forthcoming soon.</p></div></blockquote></div><p>Hello. Security updates for this&#160; vulnerability already in the mirrors. Just run </p><div class="codebox"><pre><code>apt update</code></pre></div><p> and </p><div class="codebox"><pre><code>apt upgrade</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (Ogis1975)]]></author>
			<pubDate>Fri, 26 Oct 2018 15:06:24 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12458#p12458</guid>
		</item>
		<item>
			<title><![CDATA[Heads up: X Server exploit CVE-2018-14665]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=12443#p12443</link>
			<description><![CDATA[<p>Hello:</p><p>I have not seen this posted in the Dev1 forum yet but if it this is the wrong place, please move it as necessary.</p><p>A two year old X Server vulnerability has seen the light, reported by Narendra Shinde and Red Hat a couple of days ago, it&#039;s CVE-2018-14665.</p><div class="quotebox"><cite>cve site wrote:</cite><blockquote><div><p>A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.</p></div></blockquote></div><p>Here&#039;s an article about it from The Register:</p><p><a href="https://www.theregister.co.uk/2018/10/25/x_org_server_vulnerability/" rel="nofollow">https://www.theregister.co.uk/2018/10/2 … erability/</a></p><p>Here&#039;s the cve entry:</p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665" rel="nofollow">https://cve.mitre.org/cgi-bin/cvename.c … 2018-14665</a></p><p>Here&#039;s a link to a gitlab post:</p><p><a href="https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e" rel="nofollow">https://gitlab.freedesktop.org/xorg/xse … 7c86fe330e</a></p><p>Apparently, it does <span class="bbu">not</span> affect those of us using a display manager to start an X session, so I guess most of us are covered (?).</p><p>In any case, I guess a patch/update should be forthcoming soon. </p><p>Cheers,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Fri, 26 Oct 2018 01:36:23 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=12443#p12443</guid>
		</item>
	</channel>
</rss>
